TechDay Asia - Asia's technology news network
Asia

Search

Security breaches stories - Page 10

Money flowing from tap
Are cybersecurity investments wasted money?
Mon, 18th Apr 2016
#
virtualisation
#
breach prevention
#
cybersecurity
No matter how much money we throw into cybersecurity, it seems to have little impact on reducing the damage of breaches and attacks.
File padlock
Fortinet’s Advanced Threat Protection: Secure your sensitive data, ensure your privacy
Thu, 18th Feb 2016
#
firewalls
#
network infrastructure
#
network security
Securing your data and ensuring your privacy can be difficult tasks. Here is Fortinet’s five step solution to prevent the most persistent threats.
Data
Wake up call: IoT security not up to scratch
Mon, 15th Feb 2016
#
iot
#
breach prevention
#
cybersecurity
Alarming Strategy Analytics report finds IoT security lax as firms grapple with data breaches and rising cyber threats.
Salient eye
Salient Eye app catches Kapiti Coast thief
Wed, 1st Jul 2015
#
smartphones
#
breach prevention
#
cybersecurity
Salient Eye, a free Android home security app, has helped a family in Wellington catch an intruder trying to break into their home.
Security
Meet the encryption flaw that's putting internet users at risk
Fri, 22nd May 2015
#
encryption
#
breach prevention
#
cybersecurity
LogJam allows an attacker to weaken what is believed to be a secure encrypted connection between a user and a server, according to Trend Micro.
Security 1
How to prevent data breaches
Wed, 6th May 2015
#
firewalls
#
network infrastructure
#
network security
Businesses are failing to protect themselves adequately from increasingly-sophisticated techniques used by cyber criminals, says Palo Alto Networks.
Security
Express Data & Cisco - Mobility in today’s world
Thu, 9th Apr 2015
#
firewalls
#
network security
#
breach prevention
A new approach to security has to be adopted. The firewall is still a major aspect of a security strategy, but is only part of the story.
Virtualisation provides single point of defence
Virtualisation provides single point of defence.
Thu, 1st Nov 2012
#
virtualisation
#
breach prevention
#
cloud services
Virtualisation renders a single point of defence but comes with unique security challenges, necessitating a robust focus on safeguarding the host system.
71086157
ISACA survey shows IT business problems
Wed, 8th Aug 2012
#
firewalls
#
network security
#
breach prevention
ANZ tech leaders grapple with IT staffing shortages, security breaches, and strategic disconnects, a new ISACA survey reveals.
Symantec1
Employees cause security concerns
Thu, 16th Jun 2011
#
breach prevention
#
symantec
#
social media
New Zealand businesses are concerned about security breaches stemming from staff mistakes, a recent survey from Symantec shows.
Pcvault
ICT safety & security
Mon, 1st Nov 2010
#
malware
#
breach prevention
#
cybersecurity
Businesses must implement robust cybersafety frameworks to avoid breaches, often caused by internal sources. Educating staff is essential.
Fallback
The age of consequence
Fri, 1st Oct 2010
#
breach prevention
#
bitdefender
#
security breaches
IT administrators can greatly benefit from network-wide visibility into malware related incidents and policy breaches.
Fallback
The App is King
Fri, 1st Oct 2010
#
virtualisation
#
firewalls
#
data protection
With the rise of cloud computing, traditional security measures falter, making secure application development essential—The app is now king.
Policies for productivity
Policies for productivity
Tue, 1st Sep 2009
#
edutech
#
breach prevention
#
cloud services
NetSafe launches 'The Whatsit?', a free online resource aiding SMEs in crafting ICT policies and promoting cybersafety, boosting productivity and security.
Fallback
Buckle up for compliance
Wed, 1st Apr 2009
#
breach prevention
#
risk & compliance
#
data breach
As compliance demands grow, businesses must leverage IT to automate and streamline audit processes, reduce costs, and safeguard against penalties.
Fallback
Infastructure planning checklist
Fri, 1st Sep 2006
#
datacentre infrastructure
#
phishing
#
physical security
Before planning your next customer’s datacentre installation, GFI has put together a checklist including business problems to be considered.